FREE TO VIEW


« Back to News

2018-08-08

Crypto-Mining Hits 42% Of Organisations Worlwide

Criminals are using cloud infrastructure to target organisations with crypto-mining malware to develop illegal revenue streams.

2018-08-08

EU Cybersecurity Act Could Impact Cross-Border Data Flows

The proposed EU Cybersecurity Act would create a single certification scheme for ICT and place IoT device manufacturers under major pressure.

2018-08-07

Hackers Paid Big Money To Improve Cybersecurity

Hackers are being paid big bounties by business and government agencies to discover bugs and to protect platforms, products and consumers.

2018-08-07

Business Will Benefit From Artificial Intelligence

AI will rapidly gain traction in these three critical areas of business: Decision Support, Equipment Maintenance and Customer Contact.

2018-08-01

Israel Wants Collaborators For Defence

Israel is looking to collaborate with other countries including India to develop state-level cyber shields via the Israel National Cyber Directorate.

2018-08-03

Robots Will Invade The Workplace

"The spread of computers ... will put jobs in two categories. People who tell computers what to do, and people who are told by computers what to do."

2018-08-01

UK Business Is Overconfident About Cybersecurity

75% of executives say their company is better prepared than competitors, up from 60% a year ago and 43% said their firm was a top performer.

2018-07-25

Chinese Hackers Target Cambodian Elections

Chinese spies are targeting Cambodian government institutions, opposition party members & media in advance of national elections.

2018-07-31

Facebook & Fake News

Critics claim that Facebook simply isn’t willing to make the hard choices necessary to tackle fake news.

2018-07-31

Palestinian Authorities Under Cyber Attack

A group named Gaza Cybergang that has previously targeted Palestinian law enforcement is now back in action targeting government officials.

2018-07-31

Artificial Intelligence & Threat Detection

Two elite Canadian institutions are embarked on a cybersecurity research collaboration, focused on automated threat detection mechanisms.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

AngelList

AngelList

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

ADVA Optical Networking

ADVA Optical Networking

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.

Vambrace Cybersecurity

Vambrace Cybersecurity

Vambrace is an experienced cybersecurity consultancy and operations outsourcer helping you to secure your business in an increasingly-hostile cyber environment.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.